16-15-3 - TA Triumph

If there’s one thing you can rely on,
it’s maximum data security with
ta Triumph-Adler.
Modern office communication of today has to be fast,
easy and – above all else – secure!
Due to growing transparency as well as continuously
to be mindful of the security of your company’s data.
accelerating and highly digitised business processes,
We can provide you with comprehensive support
today there are increasing data security requirements
thanks to our optional Data Security Kits in line with
regarding the creation, distribution and archiving of
the international Common Criteria security standard
information. Modern means of communication and
(ISO 15408 EAL3). The solution range from ta Triumph-
innovative technical solutions now characterise busi-
Adler addresses all levels, from local security features at
nesses and significantly contribute to efficiency,
system level right through to guaranteeing extensive
making it all the more important to eliminate unau-
network protection. Whether it’s standard integrated
thorised intrusions into the network and to prevent
security solutions or customised, upgradeable security
external access to sensitive data. Data protection is also
packages, ta Triumph-Adler is your safe choice for
gaining legal significance, providing one more reason
copying, printing, scanning and faxing data.
Where are the gaps in your armour?
Source documents that are temporarily stored as electronic
processing and administration and also protecting
data on a hard disk or in a temporary memory during
archived or temporarily stored print data, for example,
copying or scanning remain there until replaced by new
in a document box on a hard disk, from being read out
data. Ideally, these documents should be permanently
without authorisation.
overwritten rather than simply deleted in order to
eliminate the theoretical possibility of unauthorised
Faxing, however, is a different matter. Data is only
data readout.
exchanged here in the form of compressed image files
via the public telephone network. Intrusion into the
Highly secure printing specifically involves safeguard-
network and external access to the data are therefore
ing data streams from unauthorised access during their
not possible, even in the case of a network fax.
We support your security concept
at both system and network level.
Security always depends on the optimal interaction of
in use, for example, fax, printing or scanning functions
all available components. Therefore the security fea-
using a network connection or copying function using
tures of ta Triumph-Adler apply to the system itself
the hard disk. However, the success of this approach
and, more importantly, they apply at the network level.
also fundamentally depends on the company’s respon-
In this way, the most suitable security requirements can
sible handling of sensitive data and passwords.
be defined according to the functionality of the systems
Active network support:
Authentication using Windows Server 2012 as an example:
Large companies that use domain servers
Network authentication:
< Kerberos >
Panel:
User name and password
Windows 2012 Server
(Active Directory Service)
Client PC
Driver and utility
Network authentication: ON
Network authentication
Security features for printing
Login based on user name and password only
n All current network encryptions are supported
Embedded web server authentication
Set-up of a password query in the printer
(Internet access to the system)
driver for printing and storing print jobs
n Allows you to set an administrator password
n Access to the Embedded Web Server can
also be encrypted
Use of a security water mark to label copies of
printouts that were created without authorisation
Support of default network settings,
IP and port filters
including during scanning (SMB, FTP),
n Allows access to the system using
through authentication
registered IP addresses only
Increased security for the sending and
SSL encryption of the printing
receiving of emails by restricting the
n Prevents readout of data by encrypting the print
domain (e.g.,[email protected])
data stream, including the transmission path
Security functions available on the system:
Security kit
)
Send
Copy
Send
Print
Send
1. Overwriting of unwanted data
2. Encryption (
) / Decryption (
Backup of
data and
various settings
Authentication via password entry
Print
Hard disk
n Overwrites data and memory areas that
n Protects the system from third-party access
are no longer required and in which data
n Also allows procedure control and
has already been logically deleted
management code allocation for copying,
printing, scanning and faxing
n Renders the restoration of
data almost impossible
n Triple overwrite (standard setting):
Repeat copy blocking
The same area as before is overwritten
n Prevents the repeated printing out of
twice with a random pattern and then
the last copy (or copies) created
filled with zeros
n Depending on the system, this is carried
out via the system menu or using an
Encryption and compression of PDF files
optional Data Security Kit
n Restricts the opening, printing and editing
of PDF files created on the system
(Partial) blocking of the display
n Prevents system settings
from being changed
n Right of access is thus restricted
to the administrator
Authentication standard IEEE 802.1X
n This standard supports a
port-based authentication
n Only authorised users and devices are
able to connect with the network
Blocking of the USB host
n Stops direct printing of PDFs to
and scanning to USB sticks
Simplified network authentication with the
system using optional card systems (as part
of ACCOUNTING4WORK)
Data Security Kit in accordance with the
international Common Criteria security
standard (ISO 15408 EAL3) for the overwriting
n Follow2Print: intelligent re-routing of print
jobs to individually definable output systems
n SecurePrinting: maximum flexibility through
and encryption of data
support of various card systems, for instance in
n Automatically encrypts documents and user
conjunction with a central locking system
data before they are stored on a hard disk
Securely prepared
Be it multifunctional systems, printers, copiers or fax
company’s need for handling sensitive data and
machines – all of the systems in your office environ-
passwords in a responsible manner.
ment will contribute to securing your information
stream and to closing the gaps in the process using
We will be happy to provide you on request with
our extensive and innovative security functions.
a security white paper, which contains a detailed
Corresponding user security features are actively
overview of all standard system configurations and
supported in the network, optimally meeting your
the suitable security options.
Designing solutions to increase your efficiency.
ta Triumph­-Adler has set itself the objective of
service support ensure you uninterrupted, productive
organising how you handle documents on a daily basis
use of our systems. Thanks to this range of services we
as efficiently as possible. The technical perfection of
are able to provide you with the ideal solution.
our products combined with in-depth analyses,
comprehensive consultation and subsequent on-site
ta Triumph-Adler GmbH
Ohechaussee 235
22848 Norderstedt, Germany
Tel.: +49 40 52849-0
Fax: +49 40 52849-120
[email protected]
www.triumph-adler.com